Unlock instant, AI-driven research and patent intelligence for your innovation.

Story assisted mnemonic phrase

a technology of mnemonic phrase and assisted mnemonics, which is applied in the field of story assisted mnemonic phrases, can solve the problems of private key corruption or unusability of private key, did owner may somehow lose or at least lose control of private key, and storage unit where did owner has stored private key may be destroyed or los

Active Publication Date: 2021-08-26
MICROSOFT TECH LICENSING LLC
View PDF0 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

The patent describes a method to recover a private key from a random word seed. The method uses a generated story that connects the random words in a way that's easy for the user to remember. This allows the user to enter the story into a recovery mechanism, which can extract the random words, generate the private key recovery seed, and recover the private key. This method prevents the random words from being easily copied and used by others, providing better security against theft, loss, or hostile misuse of the key.

Problems solved by technology

It is possible, however, that the DID owner may somehow lose the private key or at least lose control of the private key.
For example, the storage unit where the DID owner has stored the private key may be destroyed or lost.
Alternatively, the private key may be corrupted or become unusable for various reasons.
As will be appreciated, if the private key remains lost or unusable, the DID owner may not be able to use his or her DID or access any information related to the DID.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Story assisted mnemonic phrase
  • Story assisted mnemonic phrase
  • Story assisted mnemonic phrase

Examples

Experimental program
Comparison scheme
Effect test

example recovery mechanisms

[0101]Attention is now made to FIG. 5, which illustrates one embodiment of a recovery mechanism 365 that utilizes the recovery module 360. In the embodiment, the recovery mechanism is based on random (i.e., unrelated) words that are generated and are then combined to generate a story, a paragraph, a sentence or the like that is easier for a DID owner 201 to remember than if the random words were not combined. Unlike some conventional recovery mechanisms that generate random words that are unrelated to each other, the current embodiment uses random words that are related to each by being part of the generated story, paragraph, or sentence. Advantageously, the DID owner 201 need not remember the unrelated words or have to store them in a separate location (although he or she could) where they may be accessed by a hostile third party. Instead, the DID owner 201 need only remember the generated story, paragraph, or sentence (or at least a sufficient portion of the generated story, parag...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

Embodiments disclosed herein are related to generating and using a private key recovery seed based on random words extracted from a generated story to recover the private key. An input story is received from a user. The story includes random words and filler words that were previously generated. The number of random words generated is based on an entropy level. The random words included in the story are extracted. This means that the user does not need to enter any random words that are not included in the story to recover the private key. The random words are input into a first key recovery mechanism to thereby generate a private key recovery seed. The private key recovery seed is then input into a second private key recovery mechanism, the second private key recovery mechanism generating a recovered private key upon performing a recovery operation on the private key recovery seed.

Description

BACKGROUND[0001]Most of currently used documents or records that prove identity are issued by centralized organizations, such as governments, schools, employers, or other service centers or regulatory organizations. These organizations often maintain every member's identity in a centralized identity management system. A centralized identity management system is a centralized information system used for organizations to manage the issued identities, their authentication, authorization, roles and privileges. Centralized identity management systems have been deemed as secure since they often use professionally maintained hardware and software. Typically, the identity issuing organization sets the terms and requirements for registering people with the organization. Finally, when a party needs to verify another party's identity, the verifying party often needs to go through the centralized identity management system to obtain information verifying and / or authenticating the other party's ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(United States)
IPC IPC(8): H04L9/08G06F21/32G10L17/00G10L17/06
CPCH04L9/0894G06F21/32G10L17/06G10L17/005H04L9/0869H04L9/3239G06F21/6245G06F2221/2131H04L9/50G10L17/00
Inventor MURDOCH, BRANDONPATEL, ANKURGIRVIN, LOGAN
Owner MICROSOFT TECH LICENSING LLC